tools.ietf.org/html/draft-ylonen-sshkeybcp-00

Preview meta tags from the tools.ietf.org website.

Linked Hostnames

6

Search Engine Appearance

Google

https://tools.ietf.org/html/draft-ylonen-sshkeybcp-00

Automated Access Using SSH Keys - Current Recommended Practice

Automated Access Using SSH Keys - Current Recommended Practice (Internet-Draft, 2013)



Bing

Automated Access Using SSH Keys - Current Recommended Practice

https://tools.ietf.org/html/draft-ylonen-sshkeybcp-00

Automated Access Using SSH Keys - Current Recommended Practice (Internet-Draft, 2013)



DuckDuckGo

https://tools.ietf.org/html/draft-ylonen-sshkeybcp-00

Automated Access Using SSH Keys - Current Recommended Practice

Automated Access Using SSH Keys - Current Recommended Practice (Internet-Draft, 2013)

  • General Meta Tags

    11
    • title
      draft-ylonen-sshkeybcp-00
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1
    • description
      Automated Access Using SSH Keys - Current Recommended Practice (Internet-Draft, 2013)
  • Open Graph Meta Tags

    5
    • og:title
      Automated Access Using SSH Keys - Current Recommended Practice
    • og:url
      https://datatracker.ietf.org/doc/html/draft-ylonen-sshkeybcp-00
    • og:site_name
      IETF Datatracker
    • og:description
      This document presents current recommended practice for configuring, managing, auditing, and associated policies around automated access to information systems, with particular emphasis on SSH user keys as authentication and authorization tokens but also looking into other automated access mechanisms, such as Kerberos. Starting with a review of authentication methods that can be configured for automated access, the document describes the risks involved when the management of automated access and SSH keys is neglected. It scopes the extent of the problem in particular organizations, provides a detailed roadmap for bringing automated access and SSH keys under control, and presents recommendations on continuous monitoring and ongoing management of automated access in information systems. Various remedial actions are presented and mapped to the problems they address and residual risks in the event the recommendations are not implemented. Guidance is also provided on how to organize management of automated access with the objective of reducing the system administration burden and organization operational cost, and on tools for automating the process.
    • og:type
      article
  • Link Tags

    12
    • alternate
      /feed/document-changes/draft-ylonen-sshkeybcp/
    • apple-touch-icon
      https://static.ietf.org/dt/12.47.0/ietf/images/ietf-logo-nor-180.png
    • canonical
      https://datatracker.ietf.org/doc/html/draft-ylonen-sshkeybcp-00
    • icon
      https://static.ietf.org/dt/12.47.0/ietf/images/ietf-logo-nor-32.png
    • icon
      https://static.ietf.org/dt/12.47.0/ietf/images/ietf-logo-nor-16.png

Emails

1
  • ylo%40ssh.com

Links

26